Lines Matching refs:rxkad
135 conn->rxkad.cipher = ci;
223 memcpy(&conn->rxkad.csum_iv, tmpbuf + 2, sizeof(conn->rxkad.csum_iv));
235 struct crypto_skcipher *tfm = &call->conn->rxkad.cipher->base;
279 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
326 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
352 if (!call->conn->rxkad.cipher)
364 memcpy(&iv, call->conn->rxkad.csum_iv.x, sizeof(iv));
373 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
437 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
515 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
569 if (!call->conn->rxkad.cipher)
577 memcpy(&iv, call->conn->rxkad.csum_iv.x, sizeof(iv));
586 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
638 get_random_bytes(&conn->rxkad.nonce, sizeof(conn->rxkad.nonce));
641 challenge.nonce = htonl(conn->rxkad.nonce);
768 req = skcipher_request_alloc(&conn->rxkad.cipher->base, GFP_NOFS);
777 skcipher_request_set_sync_tfm(req, conn->rxkad.cipher);
1154 if (ntohl(response->encrypted.inc_nonce) != conn->rxkad.nonce + 1) {
1207 if (conn->rxkad.cipher)
1208 crypto_free_sync_skcipher(conn->rxkad.cipher);
1212 * Initialise the rxkad security service.
1239 * Clean up the rxkad security service.
1250 const struct rxrpc_security rxkad = {
1251 .name = "rxkad",